Computer Crimes Essay

1101 words - 4 pages

Computer Crimes
Computer crimes are a major issue in the world today. They are taken place in people’s home, office, and in lots of places. A person should be very cautious about the type of personal information that they enter on there someone else’s computer as well as there own. These things could come back to haunt you in the future.
Criminal activity where a computer or network is the source, target, place or tool of a crime is what we call computer crime. Some other terms for computer crime are cybercime, e-crime, hi-tech crime, and electronic crime. None of these categories are exclusive and many activities can be characterized as falling in one or more category. Even though it states that the computer crime is when something takes place when the computer or network is a necessary part of the crime, there are some terms that are used to include traditional crimes. Some of the traditional crimes are fraud, theft, blackmail, forgery, and embezzlement when the computers or networks are used to facilitate the illicit activity.
There are a lot of different criminal activities that can be considered computer crime. Some examples of these activities are misuse of devices, forgery (theft id), electronic fraud, illegal access (unauthorized access), Trojan horses, cyberterrorism, email abuse/harassment, and data interference (unauthorized damaging, deletion, deterioration, alteration or suppression of computer data) are just a few. Forgery is a computer crime that can be perpetrated using the hardware components of the computer without the usage of the internet. For example, using Microsoft Word to type my signature when I did not actually right it and neither did you but it is still a computer crime that you committed. A Trojan horse is when a seemlingly harmless item enters the computer, it could be through in the form of an email attachment, it could come through a router with an open port, etc. However, it releases codes that causes the computer to do whatever is written in the code. Cyberterroism is terrorism done using the computer in some sort of way. Email abuse/harassment is when people use the computer to harass you whereas prior to the computer it was done via regular mail.
The growth of computer crime rapidly started in the 1970’s. Although a lot of people don’t see it, it is becoming into a problem which involves and has influences on nearly every aspect of our modern society. Due to the influence of computer crime, it has definetly changed the political, economocial, cultural and also military aspects of our society.
There are a lot of crimes that are easier to commit when using a computer. Examples of the easy to commit crimes are fraud, false inputting, fake output, forgery, theft of information, and eavesdropping. These are just a few although there are more out there.
Some of the manipulation of computers include data files, attack on hardware, theft of software, comprised measuring devices, hacking by both employees...

Find Another Essay On Computer Crimes

THE COMPUTER CRIMINAL - Computer crimes and a brief story of Kevin David Mitnick. Include details of his parole and intermediate punishment sentence. Fully cited. Includes references.

4223 words - 17 pages offender. Still, he managed to cope with being surrounded by youths who were not at all like himself. He participated in prison programs and eventually assisted the prison as he developed a computer program that the state could use to track fellow delinquent youths. Also, Mitnick assisted the Los Angeles Police Department in putting together instructional videotape on computer crimes and computer security. Following his release in 1983 it seemed as if

Computer Forensics and Criminal Justice Essay

745 words - 3 pages A good and clear understanding of the relationship between the criminal justice system and computer crimes is a key factor in the investigation of those crimes. It is important for the investigator to know how to work his/her investigation within the system and not to overlook an element that might hinder or terminate the investigation. Paying attention to the criminal justice system when, dealing with computer crimes results in success in

Computer Ethics Awareness Among University Students

930 words - 4 pages University. Other graduate students are excluded from the study. These group of students were chosen because they are readily accessible by the researcher and due to limited time that is available for the conduct of the study. The scope of the study is limited to computer crimes aspect of computer ethics.

Computer Viruses

732 words - 3 pages multiple copies of it and sent those copies from the victim’s computer, thus jam disk drives and the internet with multiple copies of the worm. Releasing such a worm into the Internet will slow the valid traffic on the internet. In the same way, many crimes involving computers are no different from crimes without computers; the computer is only a tool that a criminal uses to commit a crime. For example, using a computer or a scanner, you can


1165 words - 5 pages many people want changes to the CFAA today. The CFAA was made to cover the majority of computer crimes. The Computer Fraud and Abuse Act was created because the United States Secret Service, and other government agencies needed a law to allow them to investigate cyber-crimes. The United States government also needed a way to discourage and stop people from hacking, accessing data, and many other internet crimes from a government computer. With

Computer Crime, discusses the proposition that computer crime has increased dramatically over the last 10 years.

1387 words - 6 pages program capable of altering or erasing computer memory) is introduced into a computer system.As subjects of crime, computers represent the electronic environment in which frauds are programmed and executed; an example is the transfer of money balances in accounts to perpetrators' accounts for withdrawal. Computers are instruments of crime when they are used to plan or control such criminal acts. Examples of these types of crimes are complex

Computer crime.

1239 words - 5 pages Over the last twenty years, a technological revolution has occurred as computers are now an essential element of today's society. Large computers are used to track reservations for the airline industry, process billions of dollars for banks, manufacture products for industry, and conduct major transactions for businesses because more and more people now have computers at home and at the office. People commit computer crimes because of society's

Computers and the Law

2446 words - 10 pages QUESTIONS:- What are computer crimes?- What statutes govern computers use and abuse?- How was computer crimes dealt with in the past?ESSAY:The widespread use of Information Technology has created new opportunities for computer crimes. A computer crime, obviously involves using a computer, can be in the form of hacking, software piracy, planting viruses or storing/distributing inappropriate pornographic images to name just a few. Below and in the


700 words - 3 pages . These technologies related crimes are described by one word, which is cyber crime. According to Dan Koenig, cyber crime is a criminal offense that has been created or made possible by the advent of computer technology, or a traditional crime which has been transformed by the use of a computer. This word can also be broken down to two different concepts, which are computer crime and computer related crimes. According to Dan Koenig, “Computer

Computer Crime

1822 words - 7 pages number, expiration date, and billing address. In a one year period, it is estimated that computer crime causes hundreds of millions of dollars in damage (Carter, 3). These crimes and attacks have become so prevalent that a name has been given to the perpetrators: “hackers”. Hackers, and the crimes that they commit, have become a very serious threat to the well being of society in the United States. Hacking is defined by the CCI Online

The vulnerability of computerised accounting information systems to computer crime.

1509 words - 6 pages , it is hard to define what is actually a computer crime. People commit computer crimes, not computer. According to the Computer Fraud and Abuse Act 1986, " crime is any illegal act for which knowledge of computer technology is essential for its perpetration, investigation, or prosecution"(Bagranoff & Moscove & Simkin 2003, P322). There are many types of computer crime: Unauthorised use by both insider and outsider, theft data or

Similar Essays

Computer Crimes Essay

779 words - 3 pages The computer has evolved a great deal since its creation over a third of a century ago. The uses of the computer now seem endless. Unfortunately some of those uses include computer crimes. This paper will explore some recent crimes that have occurred and the laws that apply to them.The first such incident took place in Russia between June and October 1994. Six people were arrested in the scheme, in which $10 million was allegedly shifted from

Computer Crimes Speech

664 words - 3 pages Computer crimes are on the rise 1 in 10 Americans experience some form of a malicious attack on their computer system. If you pay attention to the rest of this speech you will understand how a Hackers mind works and how to defend yourself from them. In this speech I will tell you why and how people break into computers, what sorts of trouble they cause, and what kind of punishment lie ahead for them if caught.Hackers and Crackers break into

Categories Of Computer Crimes Essay

1277 words - 5 pages instrument of a crime, computers as incidental to crime, and crimes associated with the prevalence of computers.The first computer crime category is computers as the target. During this crime, the attacker attempts to deny a computer's authorized user and/or owner from services which the user would typically freely have access to. Another aspect of this crime category is when a cyber criminal alters data the computer's owner feels is privately

Computer Crimes Need To Be Prevented And Halted Through Increased Computer Network Security Measures As Well As Tougher Laws And Enforcement Of Those Laws In Cyberspace

3335 words - 13 pages embezzlements that might occur over long periods of time, or when a computer operator uses a computer to steal valuable information from an employer.Computers have been used for most kinds of crime, including fraud, theft, larceny, embezzlement, burglary, sabotage, espionage, murder, and forgery, since the first cases were reported in 1958. One study of 1,500 computer crimes established that most of them were committed by trusted computer users within